PinnedA Guide to Data Security Architectures — Encryption at Rest and in-TransitBuilding and deploying applications and services is super exciting. Still, when your security team prevents your application from going into production due to a lack of data encryption — this can be very annoying. Let’s take a look at the different data encryption methods that are most commonly used and…Cybersecurity3 min readCybersecurity3 min read
Nov 27, 2022Key Managers 🔐 — How Do I Pick the Right One for My Org?!Your company has a ton of daily active users and you have this amazingly efficient architecture to process requests at scale, but your InfoSec team asks you to use a key manager — there are so many out there, which one do you choose? There are various different types of…Encryption4 min readEncryption4 min read
Published in Tech to Startup to Life·Mar 2, 2019Setup Ghost Blog in a Subdirecotory over SSL on NGINXHave you ever wanted to start a blog with your own domain (without the classic outdated WordPress :P)? Ghost Blog is the best publishing platform to use! blog.domain.tld vs domain.tld/blog/: When you start a blog on a subdomain search engines like Google treat the subdomain as a separate domain which will not benefit…Nginx4 min readNginx4 min read
Published in Tech to Startup to Life·Jan 7, 2019Configure GitHub Webhooks with a Web ServerWe’ve all faced it! After pushing many updates to GitHub, you realize that you haven’t pulled from the git server onto your web server. Soon, you cannot see your updates on the web server. So, how do you solve this problem? …Git5 min readGit5 min read
Published in Tech to Startup to Life·Nov 29, 2018Embed Medium Blog Posts in WebsiteI am the lead web developer at Why Waste?. At one point in time, we at Why Waste? wanted to start writing blogs on medium. …Web Development9 min readWeb Development9 min read